Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

use split-gpg for dev env #303

Closed
sssoleileraaa opened this issue Jul 30, 2019 · 1 comment
Closed

use split-gpg for dev env #303

sssoleileraaa opened this issue Jul 30, 2019 · 1 comment

Comments

@sssoleileraaa
Copy link
Contributor

sssoleileraaa commented Jul 30, 2019

Description

Update docs once how we want to move forward with freedomofpress/securedrop-client#497

Background

The developer environment on Qubes does not use split-gpg. Instead it uses a development gpg private key inside a gpg keychain that is stored in the temporary configuration directories. This is also how it works in a non-Qubes environment.

It might make sense to use split-gpg with the key configured in the sd-gpg AppVM instead. This could make it easier to maintain (perhaps not if we still have to maintain the dev key and setup code for non-Qubes development) and also to understand the differences between running python -m securedrop_client with proxy vs ./run.sh without proxy. The only difference should be whether or not we use the securedrop-proxy RPC service and Tor is used.

@gonzalo-bulnes
Copy link
Contributor

Covered by existing docs on setting up development environments.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants